Debian 10241 Published by

The following updates has been released for Debian GNU/Linux:

DSA 4043-1: samba security update
DSA 4044-1: swauth security update



DSA 4043-1: samba security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4043-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : samba
CVE ID : CVE-2017-14746 CVE-2017-15275

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2017-14746

Yihan Lian and Zhibin Hu of Qihoo 360 GearTeam discovered a
use-after-free vulnerability allowing a client to compromise a SMB
server via malicious SMB1 requests.

CVE-2017-15275

Volker Lendecke of SerNet and the Samba team discovered that Samba
is prone to a heap memory information leak, where server allocated
heap memory may be returned to the client without being cleared.

For the oldstable distribution (jessie), these problems have been fixed
in version 2:4.2.14+dfsg-0+deb8u9.

For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u1.

We recommend that you upgrade your samba packages.

For the detailed security status of samba please refer to its security
tracker page at: https://security-tracker.debian.org/tracker/samba

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/



DSA 4044-1: swauth security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4044-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
November 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : swauth
CVE ID : CVE-2017-16613
Debian Bug : 882314

A vulnerability has been discovered in swauth, an authentication system for
Swift, a distributed virtual object store used in Openstack.

The authentication token for an user is saved in clear text to the log file,
which could enable an attacker with access to the logs to bypass the
authentication provided by swauth.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.0-2+deb9u1.

We recommend that you upgrade your swauth packages.

For the detailed security status of swauth please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/swauth

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/